2. Configuring the SGD Gateway
A. SGD Gateway Architecture Overview
Changing the Maximum Number of AIP Connections
Calculating the Number of AIP Connections
Changing the Maximum Number of HTTP Connections
Calculating the JVM Memory Size
Changing the Binding Port for the SGD Gateway
Using External SSL Accelerators
How to Enable External SSL Accelerator Support
Using Client Certificates With the SGD Gateway
How to Configure the SGD Gateway to Use Client Certificates
Enabling the Balancer Manager Application
Enabling the Reflection Service
How to Enable Unauthorized Access to the Reflection Service
How to Enable Authorized Access to the Reflection Service
About the RESTful Web Services
By default, connections between the SGD Gateway and the SGD servers in the array are secured using Secure Sockets Layer (SSL). This means that AIP over SSL data uses TCP port 5307, and HTTPS data uses TCP port 443.
To use unencrypted connections between the SGD Gateway and the SGD servers in the array, run the following command:
# gateway config create
When prompted whether to use secure connections to the SGD server, type n.
Note - Ensure that the SGD servers in the array are configured to use standard, unencrypted connections. To do this, run tarantella security stop on each SGD server in the array to turn off SGD security services.
For unencrypted connections, AIP data uses TCP port 3144, and HTTP data uses TCP port 80.